search menu icon-carat-right cmu-wordmark

CERT Coordination Center

LibTIFF contains multiple heap-based buffer overflows

Vulnerability Note VU#948752

Original Release Date: 2004-12-01 | Last Revised: 2005-03-17

Overview

LibTIFF contains multiple heap-based buffer overflows that may allow an attacker to execute arbitrary code or cause a denial-of-service condition.

Description

LibTIFF is a library used to encode and decode images in Tag Image File Format (TIFF). Multiple LibTIFF routines contain buffer overflow vulnerabilities including, but not necessarily limited to, the following functions:

    • NeXTDecode (in libtiff/tif_next.c)
    • ThunderDecode (in libtiff/tif_thunder.c)
    • LogL16Decode (in libtiff/tif_luv.c)

These issues are the result of insufficient validation of user-supplied data. Consequently, a remote attacker may be able to exploit these vulnerabilities by supplying an application using LibTIFF with a specially crafted TIFF image.

Any program that uses the LibTIFF library may be affected by this issue. Users are encouraged to contact their vendors to determine if they are vulnerable.

Impact

Specific impacts depend on the application and LibTIFF routine being attacked. Potential consequences range from abrupt and abnormal program termination to the execution of arbitrary code with the privileges of the compromised program.

Solution

Apply Patch

Patch or upgrade as specified by your vendor. Users who suspect they are vulnerable are encouraged to check with their vendor to determine the appropriate action to take.

Vendor Information

948752
 

View all 37 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Thierry Carrez and discovered by Chris Evans.

This document was written by Jeff Gennari based on information provided by Gentoo Linux Security Advisory GLSA 200410-11.

Other Information

CVE IDs: CVE-2004-0803
Severity Metric: 7.43
Date Public: 2004-10-13
Date First Published: 2004-12-01
Date Last Updated: 2005-03-17 16:01 UTC
Document Revision: 83

Sponsored by CISA.